Information Security Training

Who is Keeping Your Information Secure?

As more and more confidential information is stored and processed electronically, the risk of unauthorized access is on the rise. Data breaches and attacks make protection critical.

At New Horizons Kuwait City, our information security training programs are designed to ensure your organization is at a significantly reduced risk of an information breach and also minimizes negative impacts should a breach occur.

Information Security courses and certification are primarily created by vendor-neutral vendors such as CompTIA, (ISC)² and EC-Council. These organizations are committed to setting strict security standards that any organization can implement. Earning certifications from these vendor-neutral organizations is an ideal way to prove your skill and knowledge to your employer. We offer information security training and certification from the following vendors:

Information Security Certifications

CompTIA Security+

CompTIA Security+ training from New Horizons Kuwait City provides an excellent introduction to the security field and is typically a better entry point than jumping right into an advanced security program. With Security+, you’ll build a solid foundation of knowledge that you can build upon—helping you advance your career in the months and years to come.

Whether your goal is to become Security+ certified for your job, to prove your basic knowledge of security concepts or to gain more knowledge to secure your network, expert training from New Horizons is the perfect solution.

Security+ certification candidates must pass one exam. Although not required, it is strongly recommended that candidates possess their A+ and Network+ Certifications.

Target Audience

This course is intended for students wishing to prepare for the CompTIA Security+ Certification Exam. The qualification is aimed primarily at networking professionals, but because security is vital to all levels and job roles within an organization, it will also benefit PC support analysts, application developers and senior managers in accounting, sales, product development and marketing.

At Course Completion

Upon successful completion of this course, students will learn:

Identify network attack strategies and defenses

Understand the principles of organizational security and the elements of effective security policies

CompTIA Cybersecurity Analyst (CySA+)

CompTIA CySA+ training from New Horizons provides an excellent intermediate step in the security field. With CySA+, you’ll build on your solid foundational knowledge—helping you advance your career in the months and years to come.

As attackers have learned to evade traditional signature-based solutions such as firewalls, an analytics-based approach within the IT security industry is increasingly important for most organizations. The behavioral analytics skills covered by CySA+ identify and combat malware, and advanced persistent threats (APTs), resulting in enhanced threat visibility across a broad attack surface.

CompTIA Cybersecurity Analyst (CySA+) certification candidates must pass one exam. Although not required, it is strongly recommended that candidates have their Network+, Security+ or equivalent knowledge. Minimum of 3-4 years of hands-on information security or related experience. While there is no required prerequisite, CySA+ is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus.

Target Audience

This course is intended for students expand on their existing knowledge of IT Security and pass the CompTIA CySA+ Certification Exam. CompTIA CySA+ certification is aimed at IT professionals with (or seeking) job roles such as IT Security Analyst, Security Operations Center (SOC) Analyst, Vulnerability Analyst, Cybersecurity Specialist, Threat Intelligence Analyst, and Security Engineer.

At Course Completion

Upon successful completion of this course, students will learn:

Configure and use threat detection tools.

Perform data analysis.

Interpret the results to identify vulnerabilities, threats and risks to an organization.

CompTIA Advanced Security Practitioner

CompTIA Advanced Security Practitioner (CASP) certification training from New Horizons Kuwait City can provide you with the skills necessary to become CASP certified and ready for an advanced career in IT security.

This course is intended for IT professionals who have the technical knowledge and skills required to conceptualize, design and engineer secure solutions across complex enterprise environments. Students should have a minimum of 10 years of experience, including at least 5 years of hands-on, technical security experience.

About (ISC)2

(ISC)2 is a global non-profit organization whose primary goal is to help educate and certify Information Security professionals world-wide. Earning your (ISC)2 certifications is an excellent way to establish your knowledge and credibility.

Read descriptions of each of the (ISC)2 certifications and associated training below:

CAP - Certified Authorization Professional

The Certified Authorization Professional (CAP) certification is an objective measure of the knowledge, skills and abilities required for personnel involved in the process of authorizing and maintaining information systems. Specifically, this credential applies to those responsible for formalizing processes used to assess risk and establish security requirements and documentation. Their decisions will ensure that information systems possess security commensurate with the level of exposure to potential risk, as well as damage to assets or individuals.

Certified Information Systems Security Professional (CISSP)

New Horizons is proud to be able to provide training to assist you in preparation for the CISSP Information Security Certification exam. The CISSP certification is a globally recognized information security certification governed and bestowed by the International Information Systems Security Certification Consortium, also known as (ISC)2. It was the first information security credential accredited by the international ANSI ISO/IEC Standard 17024:2003.

Information Systems Security Management Professional (ISSMP)

This concentration requires that a candidate demonstrate two years of professional experience in the area of management, considering it on a larger enterprise-wide security model. This concentration contains deeper managerial elements such as project management, risk management, setting up and delivering a security awareness program, and managing a Business Continuity Planning program. A CISSP-ISSMP establishes, presents and governs information security programs demonstrating management and leadership skills. Typically the CISSP-ISSMP certification holder or candidate will be responsible for constructing the framework of the information security department and define the means of supporting the group internally.

Information Systems Security Architecture Professional (ISSAP)

CISSP-ISSAP requires a candidate to demonstrate two years of professional experience in the area of architecture and is an appropriate credential for Chief Security Architects and Analysts who may typically work as independent consultants or in similar capacities. The architect plays a key role within the information security department with responsibilities that functionally fit between the C-suite and upper managerial level and the implementation of the security program. He/she would generally develop, design, or analyze the overall security plan. Although this role may typically be tied closely to technology this is not necessarily the case, and is fundamentally the consultative and analytical process of information security.

Information Systems Security Engineering Professional (ISSEP)

This concentration was developed in conjunction with the U.S. National Security Agency (NSA) providing an invaluable tool for any systems security engineering professional. CISSP-ISSEP is the guide for incorporating security into projects, applications, business processes, and all information systems. Security professionals are hungry for workable methodologies and best practices that can be used to integrate security into all facets of business operations. The SSE model taught in the IATF portion of the course is a guiding light in the field of information security and the incorporation of security into all information systems.

About EC-Council

The International Council of Electronic Commerce Consultants (EC-Council) is a long-standing professional certification organization for IT Professionsals. The EC-Council's goal is to provide support for individuals who create and maintain security and IT systems.

Read descriptions of each of the EC-Council certifications and associated training below:

Certified Ethical Hacker (CEH)

Certified Ethical Hacker training and certification at New Horizons will help you learn to stop hackers by thinking and acting like one. The CEH training immerses students in an interactive environment where they will learn how to scan, test, hack, and secure their own systems. Students then learn how intruders escalate privileges and what steps can be taken to secure a system.

The CEH certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators and anyone who is concerned about the integrity of the network infrastructure.

Computer Hacking Forensic Investigator (CHFI)

The CHFI certification from EC-Council is an advanced certification for forensic network security investigators. As cybercrime has increased, the need for computer forensic investigators has grown dramatically. CHFI certified candidates may investigate invasion or theft of intellectual property, misuse of IT systems and violations of corporate IT usage policies.

The CHFI course will give participants the necessary skills to identify an intruder's footprints and to properly gather the necessary evidence to prosecute. Many of today's top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. The need for businesses to become more efficient and integrated with one another, as well as the home user, has given way to a new type of criminal, the "cyber-criminal."

Licensed Penetration Tester (LPT)

EC-Council’s Licensed Penetration Tester (LPT) certification is a natural evolution and extended value addition to its series of security related professional certifications. The LPT standardizes the knowledge base for penetration testing professionals by incorporating best practices followed by experienced experts in the field.

Gain the in-demand career skills of a professional security tester. Learn the methodologies, tools, and manual hacking techniques used by penetration testers.

EC-Council Certified Security Analyst (ECSA)

The ECSA certification is an advanced ethical hacking training certification that complements the Certified Ethical Hacker (CEH) certification by exploring the analytical phase of ethical hacking. The ECSA penetration testing course provides you with a real-world, hands-on penetration testing experience and is a globally accepted hacking and penetration testing class that covers the testing of modern infrastructures, operating systems and application environments while teaching the students how to document and write a penetration testing report.

From the commencement of the 5-day class and the activation of the ECSA Dashboard on EC-Council’s ASPEN platform, students will have 60 days in total to submit their penetration testing report based on the challenge scenario to EC-Council, which will prove that students understand the concepts taught in the course. This is the eligibility criterion to enable students to challenge the ECSA exam. The Final ECSA exam is a multiple-choice question exam. The ECSA exam includes 2 required stages. Report writing stage requires candidates to perform various penetration testing exercises on EC-Council’s iLabs before submitting a penetration test report to EC-Council for assessment. Students who submit reports to the required standards will be provided with exam vouchers for the multiple-choice exam.

CyberSec First Responder (CFR)

CertNexus CyberSec First Responder is a course designed for information assurance professionals who perform job functions related to the development, operation, management, and enforcement of cybersecurity capabilities for systems and networks.

There are a number of options in regards to cybersecurity training in the market today. From vendor-based product training to cybersecurity management courses, it can be difficult to determine which is best for any given individual. CFR combines a number of disciplines within cybersecurity and develops an understanding of how everything fits together. Couple this holistic security focus with hands-on, lab-based learning, and students are able to develop the skillset needed to be a valued member of any cybersecurity team.

At Course Completion
This course will prepare cybersecurity professionals to become the first line of response against cyber attacks by teaching students to analyze threats, design secure computing and network environments, proactively defend networks, and respond/investigate cybersecurity incidents.

CyberSAFE

CyberSAFE is a course designed for information technology end-users. There is an increasing reliance on workplace technologies and ensuring their proper use is critical to the protection of our information systems.

This course is designed to meet the needs of all organizations, irrespective of size, industry, or geographic location.

Target Audience
This course is designed for non-technical end-users of computers, mobile devices, networks, and the Internet, enabling employees of any organization to use technology more securely to minimize digital risks.

At Course Completion
Students will be able to identify many of the common risks involved in using conventional end-user technology, as well as ways to use it safely, to protect themselves and their organizations from those risks.

About ISACA

ISACA is an independent, non-profit global association founded in 1969 to provide guidance and benchmarks for information systems and risk management.

Read descriptions of each of the ISACA certifications and associated training below:

Certified in Risk and Information Systems Control (CRISC)

CRISC is the only certification that prepares and enables IT professionals for the unique challenges of IT and enterprise risk management, and positions them to become strategic partners to the enterprise.

CRISC is designed for IT professionals who have hands-on experience with risk identification, assessment, and evaluation; risk response; risk monitoring; IS control design and implementation; and IS control monitoring and maintenance.

Certified in the Governance of Enterprise IT (CGEIT)

CGEIT recognizes a wide range of professionals for their knowledge and application of enterprise IT governance principles and practices. As a CGEIT certified professional, you demonstrate that you are capable of bringing IT governance into an organization-that you grasp the complex subject holistically, and therefore, enhance value to the enterprise.

CGEIT is specifically developed for IT and business professionals who have a significant management, advisory, or assurance role relating to the governance of enterprise IT.

Certified Information Systems Auditor (CISA)

The CISA designation is a globally recognized certification for IS audit control, assurance and security professionals. Being CISA-certified showcases your audit experience, skills and knowledge, and demonstrates you are capable to manage vulnerabilities, ensure compliance and institute controls within the enterprise.

In this course students will perform evaluations of organizational policies, procedures and processes to ensure that an organization's information systems align with overall business goals and objectives. This course is aligned to the objectives established by Information Systems Audit and Control Association (ISACA) for the CISA exam.

The NIST Cybersecurity Framework

In May of 2017, The White House issued an Executive Order for “STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE,” which hold heads of executive departments and agencies (agency heads) accountable for managing cybersecurity risk to their enterprises.

Two key provisions of the executive order included:

Effective immediately, each agency head shall use The Framework for Improving Critical Infrastructure Cybersecurity (the Framework) developed by the National Institute of Standards and Technology, or any successor document, to manage the agency's cybersecurity risk.

Further, the United States seeks to support the growth and sustainment of a workforce that is skilled in cybersecurity and related fields as the foundation for achieving our objectives in cyberspace.

NIST Cybersecurity Framework Workforce Development & Certification

In partnership with itSM Solutions LLC and UMass Lowell a NSA/DHS National Center of Academic Excellence in Cyber Defense Research (CAE-R), New Horizons is proud to offer a new cybersecurity workforce development program based on the NIST Cybersecurity Framework (NCSF). This innovative, cybersecurity workforce development program is built around an NCSF Controls Factory™ model created by Larry Wilson, the CISO in the university President’s office. The itSM/UMass program teaches individuals and organizations the knowledge, skills and abilities to engineer, instrument, test, maintain and continually improve an NCSF program.

The program and its author have won the following industry awards:

Security Magazine’s Most Influential People in Security, 2016

SANS People Who Made a Difference in Cybersecurity Award, 2013

Information Security Executive (ISE) nominee for Executive of the Year for North America, 2013

ISE North America Project Award Winner I for the Academic and Public Sector Category, 2013

Audience:

IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity Framework (NCSF) across an enterprise and its supply chain. The NCSF Practitioner program teaches the knowledge to prepare for the NSCF Practitioner exam plus the skills and abilities to design, build, test, manage and improve a cybersecurity program based on the NCSF.

Benefits of NIST Cybersecurity Framework (NCSF) Certification

All programs come with a certificate of completion and continuing education credits, such as PDU and CEUs. itSM students who successfully complete the certification and meet university requirements may transfer credits and enroll in one of UMass Lowell’s master’s degree programs in information technology, such as network security or cybersecurity.

Get started today by reviewing the NCSF Certification levels and requirements below:

The NCSF Foundation Certification Course (Coming Soon)

This course covers current cybersecurity challenges and explains how organizations that implement an NCSF program can mitigate these risks. This program is focused on candidates who need a basic understanding of the NCSF to perform their daily jobs as executives, business professionals, or information technology professionals. Complete course outline is coming soon.

The NCSF Practitioner Certification Course

This course details the current cybersecurity challenges plus teaches in depth the UMass Lowell NCSF Control Factory Methodology on how to build, test, maintain and continually improve a cybersecurity program based on the NIST Cybersecurity Framework. This program is focused on candidates who need a detailed understanding of the NCSF to perform their daily roles as cybersecurity engineers, testers or operations professionals.

This course looks at cybersecurity risks and instructs students on the best approach to design and build a comprehensive technology focused cybersecurity program and business focused cyber-risk management program that will minimize risks, and at the same time, protect critical assets. Executives are keenly aware of the risks, but have limited knowledge on the best way to mitigate these risks. We will want to enable executives to answer the key question – Are we secure?

The class include lectures, informative supplemental reference materials, quizzes, exercises and tests. Outcomes and benefits from this class is a practical approach that students can use to build and maintain comprehensive cybersecurity and cyber-risk management programs.

About Blockchain Training Alliance

Blockchain Training Alliance is the largest Blockchain training and certification organization in the world. And demand for Blockchain skills is growing at the second fastest rate of any IT skill set. Blockchain Training Alliance courses will help enterprise clients keep up with the demands of business and the speed of technology, and provide both employers and workers the proven benefits of Blockchain skills certification. Blockchain training courses will help guide your organization from an initial high-level overview of what blockchain is, to in-depth, hands-on courses from Ethereum to Hyperledger.

Blockchain Training Alliance Certifications & Courses:

The Certified Blockchain Business Foundations (CBBF) certification is designed for non-technical business professionals who require basic knowledge about Blockchain and how it will be executed within an organization. The course prepares you for CBBF certification exam, and is an elite way to demonstrate your knowledge and skills in this emerging space.

The Certified Blockchain Solutions Architect (CBSA) certification is aimed at technical leaders who need to make decisions about architecture, environment, and development platforms. The course prepares you for CBSA certification exam, which is included with the class.

The Certified Blockchain Developer Ethereum (CBDE) certification is designed for those seeking an in-depth understanding and development experience of the Ethereum Blockchain platform. This course provides detailed overviews of Ethereum, smart contracts, and the development language, Solidity. The course also prepares you for CBDE certification exam, which is included with the class.

Certified Blockchain Developer Hyperledger Fabric (CBDH)

The Certified Blockchain Developer Hyperledger Fabric (CBDH) course is designed for developers and administrators who want to take a comprehensive deep dive on Hyperledger Fabric and Hyperledger Composer and covers blockchain applications, where blockchain is used, about Hyperledger Fabric, and the open source framework for developing blockchain applications and solutions with a modular architecture. The Certified Blockchain Developer Hyperledger Fabric exam is included with the class.

Additional Blockchain Training Alliance Courses

This course covers all known aspects of Blockchain security that exist in the Blockchain environment today and provides a detailed overview of all Blockchain security issues, including threats, risk mitigation, node security integrity, confidentiality, best security practices, advanced Blockchain security and more.

This course provides an overview of IoT and Blockchain, and how Blockchain holds the potential to securely unlock business and operational value of IoT to support common tasks, such as sensing, processing, storing information, and communicating.

This course covers the intersection of healthcare and Blockchain. It includes an overview of Blockchain, and uses for Blockchain in the healthcare industry, from medical records, to medical devices, insurance and more.